Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Your fitbit sleep score just worse – why is this good news here

    August 5, 2025

    My Go -TU LLM Tool dropped a super simple Mac and PC app for the local AI – why should you try it

    August 5, 2025

    The base network is suffering from 1 downtime since 2023, prevents operations for 29 minutes

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Supply series attacks NPM package with 45,000 weekly downloads
    Security

    Supply series attacks NPM package with 45,000 weekly downloads

    PineapplesUpdateBy PineapplesUpdateMay 9, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Supply series attacks NPM package with 45,000 weekly downloads
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Supply series attacks NPM package with 45,000 weekly downloads

    An NPM package called ‘Rand-User-Ecent’ has been compromised in a supply chain attack to inject objected codes that activate a remote access to a user on the user’s system.

    ,Rand-user-agent‘Package is a device that produces random user-agent strings, which is helpful in web scrapping, automatic testing and safety research.

    Although the package has been removed, it is quite popular, the average 45,000 download weekly.

    However, according to researchers AcidoThreatening actors took advantage of their semi-finished popular status to inject malicious codes in unauthorized subsequent release, which is likely to be downloaded by a significant number of downstream projects.

    Aikido discovered the agreement on May 5, 2025, when its malware analysis system marked a new version of Rand-Rand-Egent, number 1.0.110.

    On intensive examination, the researchers found the hidden code in the ‘D from’ D from/Index.JS ‘, which was only visible when the user scrolls horizontally in the source scene on the NPM site.

    Obfuscated code is hidden out of the scene
    Obfuscated code is hidden out of the scene
    Source: Aikido

    The investigation revealed that the final valid edition of the ‘Rand-User-Egent’ released 7 months ago was 2.0.82.

    Version 2.0.83, 2.0.84, and 1.0.110, which were later published, were all malicious and not releasing the same on the Github repository of the project.

    In the latest versions, embedded malicious code makes a hidden directory under the user’s home folder (~/.node_Modules) and expands the ‘module.

    Subsequently, it opens a frequent socket connection for the command and control (C2) of the attacker at http: /85.239.62 (.) 36: 36: 36: 36: 36: 36: and sends machine ID information including Hostname, Useraname, OS, OS and a generated UUID.

    Once the rat is active, it hears one of the orders given below:

    • CD – Changes in current working directory
    • Ss_dir – Reset the worker for the script path
    • SS_FCD: – Forced change in the given directory
    • SS_UPF: F, D – Uploads a single file F to Destination D
    • SS_UPD: D, Dest – Directory uploads all files in D
    • Ss_stop – Disrupts any ongoing file upload
    • (any other) – Executes it as a shell command using Child_Process.exec ()

    At the time of writing, malicious versions have been removed from the repository of the package on NPM, so the latest available version is safe, and users should return it.

    However, if you have upgraded to version 2.0.83, 2.0.84, or 1.0.110, it is important to scan a full system for signs of compromise. Note that the rat is not removed from your system by downgrading in a valid version.

    In addition, consider using the forkade but still supports the supported and better monitoring of the ‘Rand-Uzer-agent’ tool.

    Bleepingcomputer approached the developer to find out how his package was compromised, and we got the following comments:

    “5 May 2025 (16:00 UTC) was alerted to us that three unauthorized versions of the Rand-Uzer-agent were published in the NPM Registry (1.0.110, 2.0.83, 2.0.84). Maladient code was never present in our GITHUB Reposite;

    Our investigation (still running) suggests that the opponent received an old automation token from an employee and used it to publish the release of NPM. The token was not scoped with a 2-factor authentication, allowing the attacker: to publish versions present in Github, to see the version numbers legitimately, nothing is expected to happen, expected that the new release will be promoted before seeing anyone.

    There is no evidence of violation of our source-code repository, build pipeline, or corporate network. The incident was limited to the NPM registry.

    We apologize to every developer and organization affected by this incident. Protecting the open-source ecosystem is a responsibility that we take seriously, and we are committed to complete transparency because we stop every difference that allowed this attack to happen. ,

    Update 5/9 – Comment added from webscrapingapi \ _


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    attacks downloads NPM package Series supply Weekly
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis should be compared to your internet can be slow – try these DNS tricks
    Next Article I tested Zyxel USG Light 60AX, and found that it is fantastic for facilities and utilization with ease –
    PineapplesUpdate
    • Website

    Related Posts

    Security

    This Palm -Acar’s power bank can charge many devices at once – and I am for all the price.

    August 5, 2025
    Security

    Android gets patches for exploited Qualcomm defects in attacks

    August 5, 2025
    Security

    5 hard truth of a career in cyber security – and how to navigate them

    August 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Your fitbit sleep score just worse – why is this good news here

    August 5, 2025

    My Go -TU LLM Tool dropped a super simple Mac and PC app for the local AI – why should you try it

    August 5, 2025

    The base network is suffering from 1 downtime since 2023, prevents operations for 29 minutes

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.